[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US9998433B2 - Method and apparatus for managing data, and data management system using the same - Google Patents

Method and apparatus for managing data, and data management system using the same Download PDF

Info

Publication number
US9998433B2
US9998433B2 US15/098,646 US201615098646A US9998433B2 US 9998433 B2 US9998433 B2 US 9998433B2 US 201615098646 A US201615098646 A US 201615098646A US 9998433 B2 US9998433 B2 US 9998433B2
Authority
US
United States
Prior art keywords
data
encrypted
entry
section
matched information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US15/098,646
Other versions
US20160308842A1 (en
Inventor
Min Hyeok CHOE
In Seon Yoo
Yeong Seok PARK
Jae Wook Chung
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung SDS Co Ltd
Original Assignee
Samsung SDS Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung SDS Co Ltd filed Critical Samsung SDS Co Ltd
Assigned to SAMSUNG SDS CO., LTD. reassignment SAMSUNG SDS CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHOE, MIN HYEOK, CHUNG, JAE WOOK, PARK, YEONG SEOK, YOO, IN SEON
Publication of US20160308842A1 publication Critical patent/US20160308842A1/en
Application granted granted Critical
Publication of US9998433B2 publication Critical patent/US9998433B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0471Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding

Definitions

  • the present invention relates to a method and an apparatus for managing data, and a data management system using the same. More particularly, the present invention relates to a method and an apparatus for managing data collected from sensors, and a data management system using the same.
  • An aspect of the present invention provides a method and an apparatus for managing data, which can the time and cost taken to encrypt and decrypt data and can improve the security of data, and a data management system using the same.
  • Another aspect of the present invention provides a method and an apparatus for managing data, which can be used to analyze the encrypted data without decrypting this data, and a data management system using the same.
  • the time and cost taken to encrypt and decrypt data can be reduced, and the security of data can be improved.
  • the encrypted data can be analyzed without being decrypted. Therefore, the time and cost taken to decrypt the encrypted data can be reduced. Moreover, since the data obtained by decrypting the encrypted data does not exist, safety can be maintained even in the leakage of data.
  • a method for managing data comprising: receiving data about information collected by a sensor, in which at least a part of the data is encrypted; and performing an analysis in a state where both non-encrypted section and encrypted section of the data are not decrypted.
  • a method for managing data encryption comprising: allowing a sensor or an intermediate network device to encrypt at least a part of data about collected information; allowing the sensor or the intermediate network device to transmit the at least partially encrypted data; allowing a data management apparatus to receive the at least partially encrypted transmitted data; allowing the data management apparatus to store the at least partially encrypted received data; and allowing the data management apparatus to perform an analysis in a state where both non-encrypted section and encrypted section of the at least partially encrypted data are not decrypted.
  • a data management apparatus comprising: a data receiving unit for receiving data about information collected by a sensor, in which at least a part of the data is encrypted; and an analysis performing unit for performing an analysis in a state where both non-encrypted section and encrypted section of the data are not decrypted.
  • a data management system comprising: an intermediate network device for encrypting at least a part of data about information collected by a sensor and transmitting the at least partially encrypted data; and a data management apparatus for receiving the at least partially encrypted transmitted data, storing the at least partially encrypted received data without performing a decryption process, and performing an analysis in a state where the at least partially encrypted data is not decrypted.
  • FIG. 1 is a schematic view of a data management system according to an embodiment of the present invention
  • FIG. 2 is a block diagram of a data management apparatus according to an embodiment of the present invention.
  • FIG. 3 is a schematic view showing an example of encryption of data in a sensor
  • FIG. 4 is a schematic view showing an example of encryption of data in an intermediate network device
  • FIG. 5 is a schematic view showing an example of a matching information table
  • FIG. 6 is block diagram showing an example of a hardware configuration of a data management apparatus according to another embodiment of the present invention.
  • FIG. 7 is a flowchart of a data analysis method according to an embodiment of the present invention.
  • FIG. 8 is an operation flowchart of a data analysis method according to another embodiment of the present invention.
  • the “sensor” used in the description of the present invention means a device capable of collecting information and transmitting the information using wire or wireless communication.
  • the “sensor” includes things used in internet of things (IOTs).
  • a wearable device which is worn on the human body to collect information about body temperature, heart rate, and the like, may be included in the sensor of the present invention.
  • FIG. 1 is a schematic view of a data management system according to an embodiment of the present invention.
  • the data management system includes a plurality of sensors 310 , 320 , 330 , and 340 , one or more intermediate network device 210 and 220 , and a data management apparatus 100 .
  • the plurality of sensors includes a various types of sensors.
  • Each of the sensors 310 , 320 , 330 , and 340 can collect information and transmit the information. Some of the sensors may have a two-way communication function, and the others of the sensors may have only a one-way communication function.
  • Each of the sensors 310 , 320 , 330 , and 340 may transmit the collected information to the data management apparatus 100 through an intermediate network device, such as a gate way.
  • the intermediate network device is provided between the sensor and the data management apparatus 100 , and receives the data transmitted from the sensor and transmits this data to the data management apparatus.
  • the data management apparatus 100 receives data about information collected by the sensor.
  • the data management apparatus 100 may store the received data.
  • the data management apparatus 100 may perform an analysis for deriving necessary information or providing a service using the stored data.
  • the data management apparatus 100 will be described in detail with reference to FIG. 2 .
  • FIG. 2 is a block diagram of a data management apparatus according to an embodiment of the present invention.
  • the data management apparatus 100 includes a data receiving unit 110 , a data storage unit 120 , and an analysis performing unit 130 .
  • the data receiving unit 110 receives data about information collected by the sensor.
  • the data received by the data receiving unit 110 is at least partially encrypted data.
  • the data received by the data receiving unit 110 is at least partially encrypted data in the data about information collected by the sensor.
  • the encryption of at least a part of the data about the information collected by the sensor may be performed in the sensor.
  • the encryption of at least a part of the data about the information collected by the sensor may also be performed in the intermediate network device receiving this data.
  • At least partially encrypted data received by the data receiving unit 110 will be described with reference to FIGS. 3 and 4 .
  • FIG. 3 is a schematic view showing an example of encryption of data in a sensor.
  • the first sensor 310 collects information.
  • the first sensor 310 encrypts at least a part of first data 30 about the collected information (S 31 ).
  • the first sensor 310 transmits the at least partially encrypted first data 30 to the data management apparatus 100 through the first intermediate network device 210 (S 32 ).
  • FIG. 4 is a schematic view showing an example of encryption of data in an intermediate network device.
  • the first sensor 310 collects information.
  • the first sensor 310 transmits first data about the collected information to the first intermediate network device 210 (S 41 ).
  • the first intermediate network device 210 encrypts at least a part 41 a of the received first data 40 .
  • the first intermediate network device 210 transmits the first data 40 , at least a part 41 a of which is encrypted, to the data management apparatus 100 .
  • the data receiving unit 110 of the data management apparatus 100 receives the at least partially encrypted first data 41 (including 41 a and 41 b ) in the data about the information collected by the sensor 310 .
  • the sensor and/or the intermediate network device encrypt the selected data according to a predetermined method.
  • the criteria for selecting a section to be encrypted according to the predetermined method may be set and changed according to the type of information, the type of sensors, data formats, user settings, security level, and the like.
  • the section to be encrypted according to the predetermined method may be a section having an important content or a section corresponding to information involved in personal information.
  • the predetermined method can encrypt only the data section corresponding to the value measured by the sensor.
  • the data collected and transmitted by a sensor for measuring human body temperature may be set such that only a section corresponding to information about the measured value of the human body temperature is encrypted.
  • the encryption method a known encryption method can be used or applied.
  • the data storage unit 120 stores the data received from the data receiving unit 110 .
  • the data storage unit 120 stores at least partially encrypted data.
  • the data storage unit 120 stores the at least partially encrypted data without being decrypted.
  • the analysis performing unit 130 can perform an analysis of the received data or the stored data.
  • the analysis performing unit 130 can derive useful information, such as information necessary for service, by performing the analysis thereof.
  • the analysis performing unit 130 performs the analysis of the stored data in a state where the encrypted section of the data is maintained.
  • the analysis performing unit 130 performed the analysis without decrypting the encrypted section thereof.
  • the analysis performing unit 130 can perform the analysis using a matching information table, which is a table including the encrypted data and data matched with this encrypted data, without decrypting the encrypted section thereof.
  • the analysis performing unit 130 acquires information matched with the encrypted data from the matching information table.
  • the analysis performing unit 130 can use the acquired information for analysis.
  • FIG. 5 is a schematic view showing an example of a matching information table.
  • the analysis performing unit 130 can acquires the data, called “normal atmospheric pressure ( 52 a )”, and can use this acquired data in analysis.
  • the analysis performing unit 130 can acquires the data, called “normal atmospheric pressure ( 52 a )”.
  • the analysis performing unit 130 can acquires the data, called “low humidity ( 52 b )”.
  • FIG. 5 it can be seen that there is a case of a plurality of different encrypted data being matched with the same information.
  • the matching information table is set to allow a plurality of different encrypted data to be matched with the same one information.
  • the analysis performing unit 130 acquires such matching information and perform an analysis using this matching information, the protection of the collected information can be enhanced.
  • the data management apparatus 100 can perform an analysis without decrypting the encrypted data. Therefore, the data management apparatus 100 does not have a decryption key necessary for decrypting the encrypted data. That is, fundamentally, there is no method for decrypting the encrypted data. Therefore, the accurate meaning of original data cannot be determined even if the data is divulged.
  • the matching information table used in analysis is configured such that a plurality of different encrypted data are matched with the same one information, not one-to-one matching information, accurate information cannot be determined from each encrypted data even if the matching information table is divulged.
  • analysis performing unit 130 performs an analysis will be described in more detail with reference to FIG. 5 .
  • the non-encrypted section of the first data is assumed to represent the humidity information of building A at time B. Further, the non-encrypted section of the second data is assumed to represent the humidity information of building A at time C.
  • the analysis performing unit 130 can acquire the information “humidity of building A at time B is low” from the first data, and can also acquire the information “humidity of building A at time C is low” from the second data.
  • the analysis performing unit 130 can perform an analysis using the acquired information through the predetermined analysis method.
  • the predetermined analysis method commonly known various analysis methods can be used, and can be differently set and changed according to the kind of services to be provided, the information to be derived, the information to be used, or the like.
  • FIG. 6 is block diagram showing an example of a hardware configuration of a data management apparatus according to another embodiment of the present invention.
  • the data management apparatus may have a configuration of FIG. 6 .
  • the data management apparatus 100 may include a data management processor 61 , a storage unit 62 , a memory unit 63 , and a network interface 64 .
  • the data management apparatus may include a system bus 65 connected with the data management processor 61 and the memory unit 63 to become a data transfer channel.
  • the network interface may be connected to another computing apparatus.
  • Examples of the computing apparatus may include a display device and a user terminal.
  • the network interface may be Ethernet, Fire Wire, USB, or the like.
  • the storage unit 62 may be a non-volatile memory device, a hard disk, or the like, but is not limited thereto.
  • the storage unit 62 stores the data of a computer program 62 a for data management.
  • the data of the computer program 62 a for data management may include a binary executable file and other resource files.
  • the storage unit 62 may store a matching information table 62 b.
  • the memory unit 63 loads the computer program 62 a for data management.
  • the computer program 62 a for data management is provided to the data management processor 61 , and is executed by the data management processor 61 .
  • the data management processor 61 is a processor that can execute the computer program 62 a for data management. However, the data management processor 61 may not be a processor that can execute only the computer program 62 a for data management. For example, the data management processor 61 can execute other programs in addition to the computer program 62 a for data management.
  • the computer program 62 a for data management may include a series of operations which perform the processes of: receiving at least partially encrypted data in the data about information collected by sensor; and performing an analysis in a state where both the non-encrypted section and encrypted section of the at least partially encrypted data are not decrypted.
  • the process of performing the analysis may include a series of operations which perform the processes of: acquiring information matched with the encrypted data section using the specific encrypted data and the table information about information matched with the specific encrypted data; and performing an analysis using the matched information.
  • the data analysis method according to this embodiment can be performed by a computing apparatus provided with computing means.
  • the computing apparatus may be a data management apparatus 100 according to an embodiment of the present invention.
  • the configuration and operation of the data management apparatus can be understood through those having been described with reference to FIGS. 1 to 6 .
  • the data management apparatus 100 may be applied to the data analysis method according to an embodiment of the present invention.
  • FIG. 7 is a flowchart of a data analysis method according to an embodiment of the present invention.
  • a computing apparatus receives at least partially encrypted data in the data about information collected by a sensor (S 710 ).
  • the computing apparatus stores the receive data (S 720 ).
  • the computing apparatus stores the receive data without decrypting the encrypted section thereof.
  • the computing apparatus performs an analysis using the stored data according to the predetermined method (S 730 ).
  • the computing apparatus performs an analysis in the state where both the non-encrypted section and encrypted section of the stored data are not decrypted.
  • the computing apparatus performs an analysis using a matching information table without decrypting the encrypted section of the data.
  • FIG. 8 is an operation flowchart of a data analysis method according to another embodiment of the present invention.
  • the first sensor 310 is selected from sensors
  • the first intermediate network device 210 is selected from intermediate network devices
  • the operation of the first sensor 310 and the operation of the first intermediate network device 210 will be described.
  • the first sensor 310 collects information and generates data (S 810 ).
  • the first sensor 310 transmits the generated data about the information collected by the first sensor 310 to the first intermediate device 210 (S 820 ).
  • Another device for wire or wireless communication may be provided between the first sensor 310 and the first intermediate network device 210 .
  • the first intermediate network device 210 encrypts at least a part of the data received from the first sensor 310 .
  • the first intermediate network device 210 selects a section to be encrypted from the data received from the first sensor 310 , and encrypts the selected section of the data. For example, the first intermediate device 210 may encrypt the data section representing the measured value of data about the collected information.
  • the first intermediate network device 210 transmits the at least partially encrypted data about the collected information to the data management apparatus 100 (S 840 ).
  • Another device for wire or wireless communication may also be provided between the first intermediate network device 210 and the data management apparatus 100 .
  • the data management apparatus 100 receives and stores the data transmitted from the first intermediate network device 210 (S 850 ).
  • the data management apparatus 100 performs an analysis without decrypting the encrypted section of the stored data (S 860 ).
  • the data management apparatus 100 Since the data management apparatus 100 does not decrypt the encrypted section, the data obtained by decrypting the encrypted section does not exist in the data management apparatus 100 .
  • the intermediate network device encrypts at least a part of the data about the information collected by the sensor, and transmits the encrypted data to the data management apparatus 100 .
  • a part of data may be encrypted in the sensor, and the encrypted data may be transmitted to the data management apparatus 100 .
  • FIGS. 7 and 8 show operations in a specific order, it should not be understood that desired results can be obtained only when operations are executed in a specific order or in a sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, it should not be understood that the separation of various configurations in the above-described embodiments is necessarily required, and it should be understood that the above-described program components and systems can be generally integrated together into a single software product, or can be packaged into multiple software products.
  • the time and cost taken to encrypt and decrypt data can be reduced, and the security of data can be improved.
  • the encrypted data can be analyzed without being decrypted. Therefore, the time and cost taken to decrypt the encrypted data can be reduced. Moreover, since the data obtained by decrypting the encrypted data does not exist, safety can be maintained even in the leakage of data.
  • the data management apparatus 100 , the data management method, and the manage management system using the same can be effectively applied under environments of internet of things, big data collection, big data analysis, and the like. However, they are not applied only in such environments, and can be applied in all environments, in which data transmission, data storage, and data analysis are performed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A method for managing data, comprising: receiving data about information collected by a sensor, in which at least a part of the data is encrypted; and performing an analysis in a state where both non-encrypted section and encrypted section of the data are not decrypted.
Also, a method for managing data encryption, comprising: allowing a sensor or an intermediate network device to encrypt at least a part of data about collected information; allowing the sensor or the intermediate network device to transmit the at least partially encrypted data; allowing a data management apparatus to receive the at least partially encrypted transmitted data; allowing the data management apparatus to store the at least partially encrypted received data; and allowing the data management apparatus to perform an analysis in a state where both non-encrypted section and encrypted section of the at least partially encrypted data are not decrypted.

Description

This application claims priority from Korean Patent Application No. 10-2015-0052402 filed on Apr. 14, 2015 in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference in its entirety.
BACKGROUND
1. Field of the Invention
The present invention relates to a method and an apparatus for managing data, and a data management system using the same. More particularly, the present invention relates to a method and an apparatus for managing data collected from sensors, and a data management system using the same.
2. Description of the Related Art
Recently, information analysis using big data has been actively conducted.
Further, technology development and application of internet of things, in which things are connected to each other through internet to send and receive information, has also been actively conducted.
If the technology development and application of internet of things is accomplished, a massive amount of big data will be generated and used, compared to at present.
That is, various types of information are collected and analyzed by a large number of things to be able to provide various services and derive a variety of information.
However, a variety of information collected by a large number of things, including smart phones, existing around persons, may include personal private information, and the collection, storage and usage of such personal private information may lead to anxiety about leakage of personal information and may be involved in invasion of privacy.
Therefore, security of data is important in the technologies for managing and using data.
As one of the methods of improving the security of data, there is a method of encrypting data and decrypting the data as needed.
However, it takes a lot of time and cost to encrypt and process a massive amount of data. Further, it also takes a lot of time and cost to decrypt the encrypted data in order to use this data.
SUMMARY
An aspect of the present invention provides a method and an apparatus for managing data, which can the time and cost taken to encrypt and decrypt data and can improve the security of data, and a data management system using the same.
Another aspect of the present invention provides a method and an apparatus for managing data, which can be used to analyze the encrypted data without decrypting this data, and a data management system using the same.
As described above, according to the present invention, the time and cost taken to encrypt and decrypt data can be reduced, and the security of data can be improved.
Further, according to the present invention, the encrypted data can be analyzed without being decrypted. Therefore, the time and cost taken to decrypt the encrypted data can be reduced. Moreover, since the data obtained by decrypting the encrypted data does not exist, safety can be maintained even in the leakage of data.
In some embodiments, a method for managing data, comprising: receiving data about information collected by a sensor, in which at least a part of the data is encrypted; and performing an analysis in a state where both non-encrypted section and encrypted section of the data are not decrypted.
In some embodiments, a method for managing data encryption, comprising: allowing a sensor or an intermediate network device to encrypt at least a part of data about collected information; allowing the sensor or the intermediate network device to transmit the at least partially encrypted data; allowing a data management apparatus to receive the at least partially encrypted transmitted data; allowing the data management apparatus to store the at least partially encrypted received data; and allowing the data management apparatus to perform an analysis in a state where both non-encrypted section and encrypted section of the at least partially encrypted data are not decrypted.
In some embodiments, a data management apparatus, comprising: a data receiving unit for receiving data about information collected by a sensor, in which at least a part of the data is encrypted; and an analysis performing unit for performing an analysis in a state where both non-encrypted section and encrypted section of the data are not decrypted.
In some embodiments, a data management system, comprising: an intermediate network device for encrypting at least a part of data about information collected by a sensor and transmitting the at least partially encrypted data; and a data management apparatus for receiving the at least partially encrypted transmitted data, storing the at least partially encrypted received data without performing a decryption process, and performing an analysis in a state where the at least partially encrypted data is not decrypted.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other aspects and features of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
FIG. 1 is a schematic view of a data management system according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data management apparatus according to an embodiment of the present invention;
FIG. 3 is a schematic view showing an example of encryption of data in a sensor;
FIG. 4 is a schematic view showing an example of encryption of data in an intermediate network device;
FIG. 5 is a schematic view showing an example of a matching information table;
FIG. 6 is block diagram showing an example of a hardware configuration of a data management apparatus according to another embodiment of the present invention;
FIG. 7 is a flowchart of a data analysis method according to an embodiment of the present invention; and
FIG. 8 is an operation flowchart of a data analysis method according to another embodiment of the present invention.
DETAILED DESCRIPTION OF THE EMBODIMENTS
Advantages and features of the present invention and methods of accomplishing the same may be understood more readily by reference to the following detailed description of preferred embodiments and the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of the invention to those skilled in the art, and the present invention will only be defined by the appended claims. Like reference numerals refer to like elements throughout the specification.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The “sensor” used in the description of the present invention means a device capable of collecting information and transmitting the information using wire or wireless communication. The “sensor” includes things used in internet of things (IOTs).
For example, a wearable device, which is worn on the human body to collect information about body temperature, heart rate, and the like, may be included in the sensor of the present invention.
FIG. 1 is a schematic view of a data management system according to an embodiment of the present invention.
Referring to FIG. 1, the data management system according to an embodiment of the present invention includes a plurality of sensors 310, 320, 330, and 340, one or more intermediate network device 210 and 220, and a data management apparatus 100.
The plurality of sensors includes a various types of sensors. Each of the sensors 310, 320, 330, and 340 can collect information and transmit the information. Some of the sensors may have a two-way communication function, and the others of the sensors may have only a one-way communication function.
Each of the sensors 310, 320, 330, and 340 may transmit the collected information to the data management apparatus 100 through an intermediate network device, such as a gate way.
The intermediate network device is provided between the sensor and the data management apparatus 100, and receives the data transmitted from the sensor and transmits this data to the data management apparatus.
The data management apparatus 100 receives data about information collected by the sensor.
Further, the data management apparatus 100 may store the received data.
Moreover, the data management apparatus 100 may perform an analysis for deriving necessary information or providing a service using the stored data.
The data management apparatus 100 will be described in detail with reference to FIG. 2.
FIG. 2 is a block diagram of a data management apparatus according to an embodiment of the present invention.
Referring to FIG. 2, the data management apparatus 100 according to an embodiment of the present invention includes a data receiving unit 110, a data storage unit 120, and an analysis performing unit 130.
The data receiving unit 110 receives data about information collected by the sensor.
The data received by the data receiving unit 110 is at least partially encrypted data.
That is, the data received by the data receiving unit 110 is at least partially encrypted data in the data about information collected by the sensor.
The encryption of at least a part of the data about the information collected by the sensor may be performed in the sensor.
The encryption of at least a part of the data about the information collected by the sensor may also be performed in the intermediate network device receiving this data.
At least partially encrypted data received by the data receiving unit 110 will be described with reference to FIGS. 3 and 4.
FIG. 3 is a schematic view showing an example of encryption of data in a sensor.
Referring to FIG. 3, the first sensor 310 collects information.
The first sensor 310 encrypts at least a part of first data 30 about the collected information (S31).
The first sensor 310 transmits the at least partially encrypted first data 30 to the data management apparatus 100 through the first intermediate network device 210 (S32).
FIG. 4 is a schematic view showing an example of encryption of data in an intermediate network device.
The first sensor 310 collects information.
The first sensor 310 transmits first data about the collected information to the first intermediate network device 210 (S41).
The first intermediate network device 210 encrypts at least a part 41 a of the received first data 40.
The first intermediate network device 210 transmits the first data 40, at least a part 41 a of which is encrypted, to the data management apparatus 100.
The data receiving unit 110 of the data management apparatus 100 receives the at least partially encrypted first data 41 (including 41 a and 41 b) in the data about the information collected by the sensor 310.
The sensor and/or the intermediate network device encrypt the selected data according to a predetermined method.
The criteria for selecting a section to be encrypted according to the predetermined method may be set and changed according to the type of information, the type of sensors, data formats, user settings, security level, and the like.
For example, the section to be encrypted according to the predetermined method may be a section having an important content or a section corresponding to information involved in personal information. For example, the predetermined method can encrypt only the data section corresponding to the value measured by the sensor.
Specifically, for example, the data collected and transmitted by a sensor for measuring human body temperature may be set such that only a section corresponding to information about the measured value of the human body temperature is encrypted.
As the encryption method, a known encryption method can be used or applied.
Referring to FIG. 2 again, the data storage unit 120 stores the data received from the data receiving unit 110.
That is, the data storage unit 120 stores at least partially encrypted data.
The data storage unit 120 stores the at least partially encrypted data without being decrypted.
The analysis performing unit 130 can perform an analysis of the received data or the stored data.
The analysis performing unit 130 can derive useful information, such as information necessary for service, by performing the analysis thereof.
Specifically, the analysis performing unit 130 performs the analysis of the stored data in a state where the encrypted section of the data is maintained.
That is, the analysis performing unit 130 performed the analysis without decrypting the encrypted section thereof.
The analysis performing unit 130 can perform the analysis using a matching information table, which is a table including the encrypted data and data matched with this encrypted data, without decrypting the encrypted section thereof.
Subsequently, the analysis performing unit 130 acquires information matched with the encrypted data from the matching information table.
The analysis performing unit 130 can use the acquired information for analysis.
An example, in which the analysis performing unit 130 perform an analysis using the matching information table without decrypting the encrypted section of the data, will be described with reference to FIG. 5.
FIG. 5 is a schematic view showing an example of a matching information table.
Referring to the matching information table 50, in the case where the encrypted section included in the data received by the data management apparatus 100 or the data stored in the data management apparatus 100 is “AK245 (51 a)”, the analysis performing unit 130 can acquires the data, called “normal atmospheric pressure (52 a)”, and can use this acquired data in analysis.
Even in the case where the encrypted section is “BC37A (51 b)”, “TY274 (51 c)”, or “GD4KY6 (51 f), the analysis performing unit 130 can acquires the data, called “normal atmospheric pressure (52 a)”.
In the case where the encrypted section is “CKD28T (51 d)” or “JXX2YT (51 e), the analysis performing unit 130 can acquires the data, called “low humidity (52 b)”.
Continuously, referring to FIG. 5, it can be seen that there is a case of a plurality of different encrypted data being matched with the same information.
There is a case of one encrypted data being matched with the same information, but, basically, the matching information table is set to allow a plurality of different encrypted data to be matched with the same one information.
When a plurality of different encrypted data are matched with the same one information and the analysis performing unit 130 acquires such matching information and perform an analysis using this matching information, the protection of the collected information can be enhanced.
The data management apparatus 100 according to an embodiment of the present invention can perform an analysis without decrypting the encrypted data. Therefore, the data management apparatus 100 does not have a decryption key necessary for decrypting the encrypted data. That is, fundamentally, there is no method for decrypting the encrypted data. Therefore, the accurate meaning of original data cannot be determined even if the data is divulged.
Further, since the matching information table used in analysis is configured such that a plurality of different encrypted data are matched with the same one information, not one-to-one matching information, accurate information cannot be determined from each encrypted data even if the matching information table is divulged.
An example in which the analysis performing unit 130 performs an analysis will be described in more detail with reference to FIG. 5.
The actual data of “CKD28T (51 d)”, which is the encrypted section of first data about the information collected by the first sensor 310, is assumed to be “27%”. Further, the actual data of “JXX2YT (51 e)” of second data about the information collected by the first sensor 310, is assumed to be “36%”.
The non-encrypted section of the first data is assumed to represent the humidity information of building A at time B. Further, the non-encrypted section of the second data is assumed to represent the humidity information of building A at time C.
From these assumptions, the analysis performing unit 130 can acquire the information “humidity of building A at time B is low” from the first data, and can also acquire the information “humidity of building A at time C is low” from the second data.
The analysis performing unit 130 can perform an analysis using the acquired information through the predetermined analysis method. As the predetermined analysis method, commonly known various analysis methods can be used, and can be differently set and changed according to the kind of services to be provided, the information to be derived, the information to be used, or the like.
As the analysis result of the analysis performing unit 130, information for providing the service “humidification system operation for improving the humidity of building A is required”, and other various kinds of information can be derived.
FIG. 6 is block diagram showing an example of a hardware configuration of a data management apparatus according to another embodiment of the present invention.
The data management apparatus according to this embodiment may have a configuration of FIG. 6.
As shown in FIG. 6, the data management apparatus 100 may include a data management processor 61, a storage unit 62, a memory unit 63, and a network interface 64.
Further the data management apparatus may include a system bus 65 connected with the data management processor 61 and the memory unit 63 to become a data transfer channel.
The network interface may be connected to another computing apparatus. Examples of the computing apparatus may include a display device and a user terminal.
The network interface may be Ethernet, Fire Wire, USB, or the like.
The storage unit 62 may be a non-volatile memory device, a hard disk, or the like, but is not limited thereto.
The storage unit 62 stores the data of a computer program 62 a for data management. The data of the computer program 62 a for data management may include a binary executable file and other resource files.
The storage unit 62 may store a matching information table 62 b.
The memory unit 63 loads the computer program 62 a for data management.
The computer program 62 a for data management is provided to the data management processor 61, and is executed by the data management processor 61.
The data management processor 61 is a processor that can execute the computer program 62 a for data management. However, the data management processor 61 may not be a processor that can execute only the computer program 62 a for data management. For example, the data management processor 61 can execute other programs in addition to the computer program 62 a for data management.
The computer program 62 a for data management may include a series of operations which perform the processes of: receiving at least partially encrypted data in the data about information collected by sensor; and performing an analysis in a state where both the non-encrypted section and encrypted section of the at least partially encrypted data are not decrypted.
Further, the process of performing the analysis may include a series of operations which perform the processes of: acquiring information matched with the encrypted data section using the specific encrypted data and the table information about information matched with the specific encrypted data; and performing an analysis using the matched information.
Hereinafter, a data analysis method according to an embodiment of the present invention will be described with reference to FIGS. 7 and 8. The data analysis method according to this embodiment can be performed by a computing apparatus provided with computing means. For example, the computing apparatus may be a data management apparatus 100 according to an embodiment of the present invention. The configuration and operation of the data management apparatus can be understood through those having been described with reference to FIGS. 1 to 6.
Similarly, the data management apparatus 100 according to this embodiment, having been described with reference to FIGS. 1 to 6, may be applied to the data analysis method according to an embodiment of the present invention.
FIG. 7 is a flowchart of a data analysis method according to an embodiment of the present invention.
Referring to FIG. 7, a computing apparatus receives at least partially encrypted data in the data about information collected by a sensor (S710).
The computing apparatus stores the receive data (S720).
The computing apparatus stores the receive data without decrypting the encrypted section thereof.
The computing apparatus performs an analysis using the stored data according to the predetermined method (S730).
The computing apparatus performs an analysis in the state where both the non-encrypted section and encrypted section of the stored data are not decrypted. The computing apparatus performs an analysis using a matching information table without decrypting the encrypted section of the data.
FIG. 8 is an operation flowchart of a data analysis method according to another embodiment of the present invention.
For understanding, the first sensor 310 is selected from sensors, the first intermediate network device 210 is selected from intermediate network devices, and the operation of the first sensor 310 and the operation of the first intermediate network device 210 will be described.
The first sensor 310 collects information and generates data (S810). The first sensor 310 transmits the generated data about the information collected by the first sensor 310 to the first intermediate device 210 (S820).
Another device for wire or wireless communication may be provided between the first sensor 310 and the first intermediate network device 210.
The first intermediate network device 210 encrypts at least a part of the data received from the first sensor 310.
The first intermediate network device 210 selects a section to be encrypted from the data received from the first sensor 310, and encrypts the selected section of the data. For example, the first intermediate device 210 may encrypt the data section representing the measured value of data about the collected information.
The first intermediate network device 210 transmits the at least partially encrypted data about the collected information to the data management apparatus 100 (S840).
Another device for wire or wireless communication may also be provided between the first intermediate network device 210 and the data management apparatus 100.
The data management apparatus 100 receives and stores the data transmitted from the first intermediate network device 210 (S850).
The data management apparatus 100 performs an analysis without decrypting the encrypted section of the stored data (S860).
Since the data management apparatus 100 does not decrypt the encrypted section, the data obtained by decrypting the encrypted section does not exist in the data management apparatus 100.
Referring to FIG. 8, it can be ascertained that the intermediate network device encrypts at least a part of the data about the information collected by the sensor, and transmits the encrypted data to the data management apparatus 100.
Unlike this, as described with reference to FIG. 3, a part of data may be encrypted in the sensor, and the encrypted data may be transmitted to the data management apparatus 100.
Although FIGS. 7 and 8 show operations in a specific order, it should not be understood that desired results can be obtained only when operations are executed in a specific order or in a sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, it should not be understood that the separation of various configurations in the above-described embodiments is necessarily required, and it should be understood that the above-described program components and systems can be generally integrated together into a single software product, or can be packaged into multiple software products.
As described above, in the data management apparatus 100, the data management method, and the manage management system using the same according to an embodiment of the present invention, the time and cost taken to encrypt and decrypt data can be reduced, and the security of data can be improved.
Further, in the data management apparatus 100, the data management method, and the manage management system using the same according to an embodiment of the present invention, the encrypted data can be analyzed without being decrypted. Therefore, the time and cost taken to decrypt the encrypted data can be reduced. Moreover, since the data obtained by decrypting the encrypted data does not exist, safety can be maintained even in the leakage of data.
The data management apparatus 100, the data management method, and the manage management system using the same according to an embodiment of the present invention can be effectively applied under environments of internet of things, big data collection, big data analysis, and the like. However, they are not applied only in such environments, and can be applied in all environments, in which data transmission, data storage, and data analysis are performed.
Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.

Claims (12)

What is claimed is:
1. A method for managing data, comprising:
receiving data collected by a sensor, the data comprising an encrypted section and a non-encrypted section, the encrypted section comprising a first encrypted data entry and a second encrypted data entry;
using a mapping table to map the first encrypted data entry and the second encrypted data entry to a first matched information entry without decrypting the first encrypted data entry and the second encrypted data entry, wherein the first encrypted data entry corresponds to a first decrypted data value that is different from the first matched information entry, and wherein the second encrypted data entry corresponds to a second decrypted data value that is different from the first matched information entry and the first decrypted data value; and
based on at least the first matched information entry, performing, via a hardware processor, an analysis of the data without decrypting the encrypted section,
wherein the first decrypted data value and the second decrypted data value indicate measured values by a sensor, and
wherein the first matched information indicates processed information obtained by processing the measured values according to a predetermined criterion.
2. The method for managing data according to claim 1, wherein the performing the analysis comprises:
acquiring matched information that is matched with the encrypted section of the data by using the mapping table, which includes mapping relationships between the encrypted section and the matched information; and
performing the analysis further based on the matched information.
3. The method for managing data according to claim 2,
wherein the mapping relationships of the mapping table allow a plurality of different encrypted data entries of the encrypted section to be matched with a same matched information entry of the matched information.
4. The method for managing data according to claim 3, wherein the encrypted section further comprises a third encrypted data entry,
wherein the using the mapping table further comprises mapping the third encrypted data entry to a second matched information entry that is different from the first matched information entry, and
wherein the third encrypted data entry corresponds to a third decrypted data value that is different from the second matched information entry, the first decrypted data value, and the second decrypted data value.
5. The method for managing data according to claim 1, further comprising:
storing the encrypted section of the data without decrypting the encrypted section.
6. A method for managing data encryption, comprising:
encrypting, by one of a sensor and an intermediate network device connected between the sensor and a data management apparatus, at least a part of data collected by the sensor to yield partially encrypted data comprising an encrypted section and a non-encrypted section, the encrypted section comprising a first encrypted data entry and a second encrypted data entry;
transmitting, by the one of the sensor and the intermediate network device, the partially encrypted data;
receiving, by the data management apparatus, the partially encrypted transmitted data;
storing, by the data management apparatus, the partially encrypted received data;
using a mapping table to map the first encrypted data entry and the second encrypted data entry to a first matched information entry without decrypting the first encrypted data entry and the second encrypted data entry, wherein the first encrypted data entry corresponds to a first decrypted data value that is different from the first matched information entry, and wherein the second encrypted data entry corresponds to a second decrypted data value that is different from the first matched information entry and the first decrypted data value; and
based on at least the first matched information entry, performing, by the data management apparatus, an analysis of the partially encrypted data without decrypting the encrypted section,
wherein the first decrypted data value and the second decrypted data value indicate measured values by a sensor, and
wherein the first matched information indicates processed information obtained by processing the measured values according to a predetermined criterion.
7. The method for managing data encryption according to claim 6, wherein the encrypted section is selected from the data according to a predetermined method.
8. The method for managing data encryption according to claim 6, wherein the encrypted section represents measured values of the data collected by the sensor.
9. A data management apparatus, comprising:
a hardware processor; and
a non-transitory computer-readable storage medium storing instructions which, when executed by the hardware processor, cause the hardware processor to perform operations comprising:
receiving data collected by a sensor, the data comprising an encrypted section and a non-encrypted section, the encrypted section comprising a first encrypted data entry and a second encrypted data entry,
using a mapping table to map the first encrypted data entry and the second encrypted data entry to a first matched information entry without decrypting the first encrypted data entry and the second encrypted data entry, wherein the first encrypted data entry corresponds to a first decrypted data value that is different from the first matched information entry, and wherein the second encrypted data entry corresponds to a second decrypted data value that is different from the first matched information entry and the first decrypted data value, and
based on at least the first matched information entry, performing an analysis of the data without decrypting the encrypted section,
wherein the first decrypted data value and the second decrypted data value indicate measured values by a sensor, and
wherein the first matched information indicates processed information obtained by processing the measured values according to a predetermined criterion.
10. The data management apparatus according to claim 9, wherein the data management apparatus does not have a decryption key for decrypting the encrypted section of the data.
11. The data management apparatus according to claim 9, wherein the non-transitory computer-readable storage medium stores additional instructions which, when executed by the hardware processor, cause the hardware processor to perform further operations comprising acquiring matched information that is matched with the encrypted section of the data by using the mapping table, which includes mapping relationships between the encrypted section and the matched information, and perform the analysis further based on the matched information.
12. The data management apparatus according to claim 11, wherein the mapping relationships of the mapping table allow a plurality of different encrypted data entries of the encrypted section to be matched with a same matched information entry of the matched information.
US15/098,646 2015-04-14 2016-04-14 Method and apparatus for managing data, and data management system using the same Active US9998433B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020150052402A KR101683592B1 (en) 2015-04-14 2015-04-14 Method and Apparatus for Managing Data, Data Management System Using the Same
KR10-2015-0052402 2015-04-14

Publications (2)

Publication Number Publication Date
US20160308842A1 US20160308842A1 (en) 2016-10-20
US9998433B2 true US9998433B2 (en) 2018-06-12

Family

ID=57129494

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/098,646 Active US9998433B2 (en) 2015-04-14 2016-04-14 Method and apparatus for managing data, and data management system using the same

Country Status (2)

Country Link
US (1) US9998433B2 (en)
KR (1) KR101683592B1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11956628B2 (en) * 2020-11-23 2024-04-09 Cisco Technology, Inc. Openroaming for private communication systems
CN113452757B (en) * 2021-06-03 2022-03-22 深信服科技股份有限公司 Decryption method, terminal device and computer-readable storage medium

Citations (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236701A1 (en) * 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a fob
US20050169473A1 (en) * 2004-02-03 2005-08-04 Candelore Brant L. Multiple selective encryption with DRM
US20070002140A1 (en) * 2005-05-03 2007-01-04 Greg Benson Trusted monitoring system and method
US20070177771A1 (en) * 2006-02-02 2007-08-02 Masahide Tanaka Biometrics System, Biologic Information Storage, and Portable Device
US20080247539A1 (en) * 2007-04-05 2008-10-09 Huang Shih-I Method and system for secure data aggregation in wireless sensor networks
US20090141898A1 (en) * 2007-11-30 2009-06-04 Huang Shih-I Method and system for secure data aggregation in wireless sensor networks
US20100211800A1 (en) * 2007-09-21 2010-08-19 Maurizio La Rocca Systems and methods for partial matching searches of encrypted retained data
US20110103583A1 (en) * 2009-10-29 2011-05-05 Korea Internet & Security Agency Method and system for preserving security of sensor data and recording medium using thereof
US20110141967A1 (en) * 2009-12-14 2011-06-16 Lane Sean L Methods and apparatus related to substantially real-time data transmission and analysis for sensors
US20110211593A1 (en) * 2009-04-08 2011-09-01 Gerald Pepper Capturing Packets With Parallel Capture Engines
US20110224912A1 (en) * 2010-03-11 2011-09-15 Philometron, Inc. Physiological Monitor System for Determining Medication Delivery and Outcome
JP2011211593A (en) 2010-03-30 2011-10-20 Fujitsu Ltd Authentication apparatus, encryption apparatus, token device, authentication method, and authentication program
US20110264920A1 (en) * 2010-04-27 2011-10-27 Fuji Xerox Co., Ltd. Systems and methods for communication, storage, retrieval, and computation of simple statistics and logical operations on encrypted data
US8069470B1 (en) * 2005-04-13 2011-11-29 Oracle America, Inc. Identity and authentication in a wireless network
US20120260108A1 (en) * 2011-04-11 2012-10-11 Steve Lee Font encryption and decryption system and method
US20130152121A1 (en) * 2010-05-19 2013-06-13 Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. Transport-stream provider, dab signal provider, transport stream analyzer, dab receiver, method, computer program, and transport stream signal
US20130173905A1 (en) * 2011-04-20 2013-07-04 Panasonic Corporation Transmitting terminal, receiving terminal, id numbering device, and key transmission method
US20130173778A1 (en) * 2011-12-30 2013-07-04 Bmc Software, Inc. Monitoring network performance remotely
US20130328697A1 (en) * 2012-05-24 2013-12-12 Douglas H. Lundy Threat detection system and method
US20140049653A1 (en) * 2012-08-20 2014-02-20 Jon N. Leonard Authentication and Validation of Smartphone Imagery
US20140153724A1 (en) * 2012-12-04 2014-06-05 Samsung Electronics Co., Ltd. Data processing method, sensor device, and user terminal
KR101438274B1 (en) 2012-09-20 2014-09-15 동국대학교 경주캠퍼스 산학협력단 Method for checking a health condition though smart terminal and health condition check system using the method
US20140304519A1 (en) * 2011-11-08 2014-10-09 Ats Group (Ip Holdings) Limited Method and system for preserving privacy and accountability
US20140368601A1 (en) * 2013-05-04 2014-12-18 Christopher deCharms Mobile security technology
US20140379817A1 (en) * 2013-06-25 2014-12-25 Nest Labs, Inc. Fabric network
US20150025849A1 (en) * 2006-04-28 2015-01-22 Fitsense Technology, Inc. Intelligent device and data network
US20150035959A1 (en) * 2013-03-15 2015-02-05 eagleyemed, Inc. Multi-site data sharing platform
US20150089243A1 (en) * 2013-09-26 2015-03-26 Koninklijke Kpn N.V. Secure Evaluation of a Program
US20150104012A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for delivering image data from captured images to devices
US20150104013A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for handling captured image data that is received by devices
US20150134541A1 (en) * 2012-04-20 2015-05-14 Pows Technologies Limited Chip-and-pin reader device and commercial transaction system including same
US20150163053A1 (en) * 2012-08-23 2015-06-11 Fujitsu Limited Relay apparatus, method, and system
US20150164411A1 (en) * 2013-12-13 2015-06-18 Vital Connect, Inc. Automated prediction of apnea-hypopnea index using wearable devices
US9078015B2 (en) * 2010-08-25 2015-07-07 Cable Television Laboratories, Inc. Transport of partially encrypted media
US20160098698A1 (en) * 2014-10-01 2016-04-07 Ca, Inc. Methods for enabling mobile payments
US20160102878A1 (en) * 2014-10-08 2016-04-14 Google Inc. Data management profile for a fabric network
US20160275294A1 (en) * 2015-03-16 2016-09-22 The MaidSafe Foundation Data system and method
US20170104752A1 (en) * 2015-10-13 2017-04-13 Fujitsu Limited Method of processing a ciphertext, apparatus, and storage medium
US20170104733A1 (en) * 2015-10-09 2017-04-13 Intel Corporation Device, system and method for low speed communication of sensor information
US9646166B2 (en) * 2013-08-05 2017-05-09 International Business Machines Corporation Masking query data access pattern in encrypted data
US20170188250A1 (en) * 2014-07-09 2017-06-29 Leeo, Inc. Fault diagnosis based on connection monitoring

Patent Citations (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236701A1 (en) * 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a fob
US20050169473A1 (en) * 2004-02-03 2005-08-04 Candelore Brant L. Multiple selective encryption with DRM
US8069470B1 (en) * 2005-04-13 2011-11-29 Oracle America, Inc. Identity and authentication in a wireless network
US20070002140A1 (en) * 2005-05-03 2007-01-04 Greg Benson Trusted monitoring system and method
US20070177771A1 (en) * 2006-02-02 2007-08-02 Masahide Tanaka Biometrics System, Biologic Information Storage, and Portable Device
US20150025849A1 (en) * 2006-04-28 2015-01-22 Fitsense Technology, Inc. Intelligent device and data network
US20080247539A1 (en) * 2007-04-05 2008-10-09 Huang Shih-I Method and system for secure data aggregation in wireless sensor networks
US20100211800A1 (en) * 2007-09-21 2010-08-19 Maurizio La Rocca Systems and methods for partial matching searches of encrypted retained data
US20090141898A1 (en) * 2007-11-30 2009-06-04 Huang Shih-I Method and system for secure data aggregation in wireless sensor networks
US20110211593A1 (en) * 2009-04-08 2011-09-01 Gerald Pepper Capturing Packets With Parallel Capture Engines
US20110103583A1 (en) * 2009-10-29 2011-05-05 Korea Internet & Security Agency Method and system for preserving security of sensor data and recording medium using thereof
US20110141967A1 (en) * 2009-12-14 2011-06-16 Lane Sean L Methods and apparatus related to substantially real-time data transmission and analysis for sensors
US20110224912A1 (en) * 2010-03-11 2011-09-15 Philometron, Inc. Physiological Monitor System for Determining Medication Delivery and Outcome
JP2011211593A (en) 2010-03-30 2011-10-20 Fujitsu Ltd Authentication apparatus, encryption apparatus, token device, authentication method, and authentication program
US20110264920A1 (en) * 2010-04-27 2011-10-27 Fuji Xerox Co., Ltd. Systems and methods for communication, storage, retrieval, and computation of simple statistics and logical operations on encrypted data
US20130152121A1 (en) * 2010-05-19 2013-06-13 Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. Transport-stream provider, dab signal provider, transport stream analyzer, dab receiver, method, computer program, and transport stream signal
US9078015B2 (en) * 2010-08-25 2015-07-07 Cable Television Laboratories, Inc. Transport of partially encrypted media
US20120260108A1 (en) * 2011-04-11 2012-10-11 Steve Lee Font encryption and decryption system and method
US20130173905A1 (en) * 2011-04-20 2013-07-04 Panasonic Corporation Transmitting terminal, receiving terminal, id numbering device, and key transmission method
US20140304519A1 (en) * 2011-11-08 2014-10-09 Ats Group (Ip Holdings) Limited Method and system for preserving privacy and accountability
US20130173778A1 (en) * 2011-12-30 2013-07-04 Bmc Software, Inc. Monitoring network performance remotely
US20150134541A1 (en) * 2012-04-20 2015-05-14 Pows Technologies Limited Chip-and-pin reader device and commercial transaction system including same
US20130328697A1 (en) * 2012-05-24 2013-12-12 Douglas H. Lundy Threat detection system and method
US20140049653A1 (en) * 2012-08-20 2014-02-20 Jon N. Leonard Authentication and Validation of Smartphone Imagery
US20150163053A1 (en) * 2012-08-23 2015-06-11 Fujitsu Limited Relay apparatus, method, and system
KR101438274B1 (en) 2012-09-20 2014-09-15 동국대학교 경주캠퍼스 산학협력단 Method for checking a health condition though smart terminal and health condition check system using the method
US20140153724A1 (en) * 2012-12-04 2014-06-05 Samsung Electronics Co., Ltd. Data processing method, sensor device, and user terminal
KR20140071605A (en) 2012-12-04 2014-06-12 삼성전자주식회사 Method for processing data, sensor device and user terminal
US20150035959A1 (en) * 2013-03-15 2015-02-05 eagleyemed, Inc. Multi-site data sharing platform
US20140368601A1 (en) * 2013-05-04 2014-12-18 Christopher deCharms Mobile security technology
US20140379817A1 (en) * 2013-06-25 2014-12-25 Nest Labs, Inc. Fabric network
US9646166B2 (en) * 2013-08-05 2017-05-09 International Business Machines Corporation Masking query data access pattern in encrypted data
US20150089243A1 (en) * 2013-09-26 2015-03-26 Koninklijke Kpn N.V. Secure Evaluation of a Program
US20150104012A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for delivering image data from captured images to devices
US20150104013A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for handling captured image data that is received by devices
US20150164411A1 (en) * 2013-12-13 2015-06-18 Vital Connect, Inc. Automated prediction of apnea-hypopnea index using wearable devices
US20170188250A1 (en) * 2014-07-09 2017-06-29 Leeo, Inc. Fault diagnosis based on connection monitoring
US20160098698A1 (en) * 2014-10-01 2016-04-07 Ca, Inc. Methods for enabling mobile payments
US20160102878A1 (en) * 2014-10-08 2016-04-14 Google Inc. Data management profile for a fabric network
US20160275294A1 (en) * 2015-03-16 2016-09-22 The MaidSafe Foundation Data system and method
US20170104733A1 (en) * 2015-10-09 2017-04-13 Intel Corporation Device, system and method for low speed communication of sensor information
US20170104752A1 (en) * 2015-10-13 2017-04-13 Fujitsu Limited Method of processing a ciphertext, apparatus, and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Communication dated Jun. 7, 2016, issued by the Korean Intellectual Property Office in counterpart Korean Application No. 10-2015-0052402.

Also Published As

Publication number Publication date
KR101683592B1 (en) 2016-12-07
KR20160122473A (en) 2016-10-24
US20160308842A1 (en) 2016-10-20

Similar Documents

Publication Publication Date Title
EP3380979B1 (en) Systems and methods for detecting sensitive information leakage while preserving privacy
US8996886B2 (en) Encrypted biometric data management and retrieval
US9544151B2 (en) Controlling access to clinical data analyzed by remote computing resources
KR101438274B1 (en) Method for checking a health condition though smart terminal and health condition check system using the method
JP6814147B2 (en) Terminals, methods, non-volatile storage media
US20180069696A1 (en) Encrypted data management method and device
US20140172830A1 (en) Secure search processing system and secure search processing method
CN104025498A (en) Methods and apparatus for sharing real-time user context information
US9767294B2 (en) Intermediate server, database query processing method and program
CN109981275B (en) Data transmission method, device, system, equipment and storage medium
CN110727949A (en) Data storage method and device, computer equipment and storage medium
EP2942899A1 (en) Information processing method, trust server and cloud server
US9998433B2 (en) Method and apparatus for managing data, and data management system using the same
WO2016103960A1 (en) Control device, statistical analysis device, decoding device and transmitting device
US20180013830A1 (en) Method and system for managing encrypted data of devices
EP3816835A1 (en) Personal information analysis system and personal information analysis method
KR102222600B1 (en) Method for simultaneously processing encryption and de-identification of privacy information, server and cloud computing service server for the same
US20130262600A1 (en) Image processing apparatus
EP3288241B1 (en) Medium storing data conversion program, data conversion device, and data conversion method
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
WO2013147873A1 (en) Protecting context-sensitive data
CN112699391B (en) Target data sending method and privacy computing platform
US20220309178A1 (en) Private searchable database
CN114629644A (en) Data encryption method, storage medium, computer program product and electronic device
KR101736210B1 (en) Method and Apparatus for Managing Data, Network Intermediate Apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: SAMSUNG SDS CO., LTD., KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHOE, MIN HYEOK;YOO, IN SEON;PARK, YEONG SEOK;AND OTHERS;REEL/FRAME:038282/0156

Effective date: 20160405

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4